Owner's Manual
903
meant to transmit IPv6 packets between
dual-stack nodes on top of an IPv4 network.
KEY — In cryptography, a key is a variable
value that is applied using an algorithm to a
string or block of unencrypted text to pro-
duce encrypted text. The length of the key
generally determines how difficult it will be
to decrypt the text in a given message.
KEY MANAGEMENT — The establishment
and enforcement of message encryption
and authentication procedures, in order to
provide privacy-enhanced mail (PEM) ser-
vices for electronic mail transfer over the
Internet.
MANAGED OBJECT — A network device
managed by the system.
MEDIATION — Communication between
this application and external systems or
devices, for example, printers. Mediation
services let this application treat these
devices as objects.
MEDIATION AGENT — Any communication
to and from equipment is handled by the
Mediation Agent. This communication
includes SNMP requests, ASCII requests,
and unsolicited ASCII messages. In addi-
tion, the Mediation Agent receives and
translates emitted SNMP traps and con-
verts them into events.
MEG — Maintenance Entity Group
MEP — Maintenance End Point
MIB — Management Information Base. A
database (repository) of equipment con-
taining object characteristics and parame-
ters that can be monitored by the network
management system.
OAM — Operation, Administration and
Maintenance
OID — Object ID.
OSPF — Open Shortest Path First routing
protocol.
POLICY — A rule made up of conditions and
actions and associated with a profile. Policy
objects contain business rules for perform-
ing configuration changes in the network
for controlling Quality of Service and
Access to network resources. Policy can be
extended to perform other configuration
functions, including routing behavior,
VLAN membership, and VPN security.
POLICY ENFORCEMENT POINTS (PEP) — In a
policy enforced network, a policy enforce-
ment point represents a security appliance
used to protect one or more endpoints.
PEPs are also points for monitoring the
health and status of a network. PEPs are
generally members of a policy group.
POLICY ROUTING — Routing scheme that
forwards packets to specific interfaces
based on user-configured policies. Such
policies might specify that traffic sent from
a particular network should be routed
through interface, while all other traffic
should be routed through another inter-
face.
POLICY RULES — In a policy enforced net-
work (PEN), policy rules determine how
the members and endpoint groups of a pol-
icy group communicate.
PPTP (POINT-TO-POINT TUNNELING
PROTOCOL)—Point-to-Point Tunneling
Protocol (PPTP) is a network protocol that
enables the secure transfer of data from a
remote client to a private enterprise server
by creating a virtual private network (VPN)
across TCP/IP-based data networks. PPTP
supports on-demand, multi-protocol, vir-
tual private networking over public net-
works, such as the Internet.